Archive by month December

How cyberattacks threaten real-world peace

More and more, nations are waging attacks with cyber weapons — silent strikes on another country’s computer systems that leave behind no trace. (Think of the Stuxnet worm.) Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict — and how we might avert this global security hazard. (Filmed at TEDxParis.)

Kases sistēmu ļaunatūra ļāva restorānam “Gan Bei” krāpties ar nodokļiem

Kases sistēmu ļaunatūra ļāva restorānam “Gan Bei” krāpties ar nodokļiem

Podiņš sacīja, ka kratīšanas un aizturēšanas ir veiktas arī vienā no Latvijas lielākajiem kases sistēmu izstrādāšanas uzņēmumiem, kurš savas kases sistēmas piegādājis lielai daļai Latvijas tirgotāju, pakalpojumu sniedzēju un citu klientu. Kopā ar kases sistēmām šis uzņēmums klientiem piedāvājis zibatmiņas ar ļaunprogrammatūru, kura, slēdzot kasi, pēc saviem ieskatiem ļāvusi samazināt kasē esošo naudas summu un izņemt to no kases skaidrā naudā. Tādā veidā tika samazināts uzņēmuma oficiālais apgrozījums. “Grupējums bija ar ļoti sarežģītu struktūru, skrupulozi plānoja savu darbību, tajā strādāja augsta līmeņa speciālisti. Starp aizturētajiem ir arī šī kases sistēmu uzņēmuma vadītāji, kas vienlaikus ir arī ļaunprogrammatūras izstrādātāji,” skaidroja Podiņš. Zibatmiņu ar ļaunprogrammatūru uzņēmums klientiem piedāvāja par 1500 eiro, šai […]

Linux Destructive Commands You Should *Never* Use

Linux Destructive Commands You Should *Never* Use

Linux’s terminal commands are powerful, and Linux won’t ask you for confirmation if you run a command that won’t break your system. It’s not uncommon to see trolls online recommending new Linux users run these commands as a joke. Learning the commands you shouldn’t run can help protect you from trolls while increasing your understanding of how Linux works. This isn’t an exhaustive guide, and the commands here can be remixed in a variety of ways. Note that many of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work otherwise. On other Linux distributions, most commands must be run as root. rm […]

Get a List of Software Installed on Your PC with a Single Line of PowerShell

Get a List of Software Installed on Your PC with a Single Line of PowerShell

How to Get a List of Installed Software on Your PC Getting a list of installed software is as simple as using this straightforward WMI query. Get-WmiObject -Class Win32_Product | Select-Object -Property Name   You will probably want to export that to a file though, which is also easy enough — we’ll send the output using the > symbol and adding the path to a new text file that we want to create. Get-WmiObject -Class Win32_Product | Select-Object -Property Name > C:\Software\PCapps.txt What makes using PowerShell really neat is that if you do this on two different machines, you can easily compare the software installed on them. Compare-Object -ReferenceObject (Get-Content […]